IWETHEY v. 0.3.0 | TODO
1,095 registered users | 0 active users | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New Stack-based security
The runtime will check the permissions granted at each point on the stack, and move up the stack until either it finds the permission \ufffd at which point the code will be allowed to continue \ufffd or until it reaches the top of the stack, at which point an exception will be thrown.
Now, this is very strange to me. I've written stack-based security systems for MUDs before, and they always behaved exactly opposite to this; ie., every object in the call stack had to have permission to perform the operation (unless explicitly marked bypass, as in the case of a trusted daemon making a write to a secure log file).

With Microsoft's system, you just have to somehow get your code called by a trusted component, and away you go. The permissions will be in the call stack, and you'll have free reign.
Regards,

-scott anderson

"Welcome to Rivendell, Mr. Anderson..."
Collapse Edited by admin Feb. 14, 2002, 09:43:24 AM EST
Stack-based security
The runtime will check the permissions granted at each point on the stack, and move up the stack until either it finds the permission — at which point the code will be allowed to continue — or until it reaches the top of the stack, at which point an exception will be thrown.
Now, this is very strange to me. I've written stack-based security systems for MUDs before, and they always behaved exactly opposite to this; ie., every object in the call stack had to have permission to perform the operation (unless explicitly marked transparent, as in the case of a trusted daemon making a write to a secure log file). With Microsoft's system, you just have to somehow get your code called by a trusted component, and away you go. The permissions will be in the call stack, and you'll have free reign.
Regards,

-scott anderson

"Welcome to Rivendell, Mr. Anderson..."
     Good link on .NET - (ben_tilly) - (27)
         Just confirms it-who couldn't figure as much 1 or 2 yrs ago? -NT - (CRConrad)
         Stack-based security - (admin)
         A different .NET link, makes me sick - (bluke) - (3)
             Some get to be sharks... - (ben_tilly)
             Blink blink - (wharris2)
             Dunno if he really believes it, but he has a reason to gush - (CRConrad)
         .NET Visual Studio - (tuberculosis) - (1)
             ...has at least one security-related compiler bug already - (CRConrad)
         Sounds about like I expected - (tonytib) - (8)
             Something nasty that I just realized (oops, I was wrong) - (ben_tilly) - (5)
                 Not sure you are right about the linking part. - (a6l6e6x) - (4)
                     Getting interfaces right - (wharris2) - (2)
                         When you're innovating at internet speed,... - (a6l6e6x) - (1)
                             I know the sign, and I endorse it :=) -NT - (wharris2)
                     D'oh - (ben_tilly)
             Re: Side note for Ben - (a6l6e6x) - (1)
                 You have to understand the context - (tonytib)
         I would miss dynamic typing. - (static) - (9)
             Take your pick - (ben_tilly) - (8)
                 Please, sir... - (static) - (7)
                     Very simple - (ben_tilly) - (6)
                         Versions peresnt during packaging? - (Arkadiy) - (3)
                             No - (ben_tilly) - (2)
                                 To do library versioning dynamically... - (neelk) - (1)
                                     Huh, interesting - (ben_tilly)
                         Yes, it makes sense now. - (static)
                         Specify prefered libraries up front - (tablizer)

How I Learned to Stop Worrying and Love the Bomb
47 ms